Methods, apparatus, systems and articles of manufacture are disclosed to network unmanned aerial vehicles (UAVs). An example method includes establishing, with a processor, a discoverable network node in a first unmanned aerial vehicle in response to deployment in a geographic region of interest, joining, with the processor, a second unmanned aerial vehicle to the communication network in response to a connection request, acquiring, with the processor, payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest, identifying, with the processor, a profile type of the payload data, and transmitting, with the processor, a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has a first profile type.
|
15. A tangible computer readable storage medium, including instructions that, when executed by a processor, cause the processor at least to perform operations comprising:
establishing a discoverable network node in a first unmanned aerial vehicle in response to deployment in a geographic region of interest;
joining a second unmanned aerial vehicle to a communication network in response to a connection request;
acquiring payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest;
identifying a profile type of the payload data;
dividing the payload data into a plurality of portions based at least on a number of unmanned aerial vehicles associated with the communication network when the profile type of the payload data has a first profile type; and
transmitting a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has the first profile type.
1. A method to establish a communication network for unmanned aerial vehicles, the method comprising:
establishing, with a processor, a discoverable network node in a first unmanned aerial vehicle in response to deployment in a geographic region of interest;
joining, with the processor, a second unmanned aerial vehicle to the communication network in response to a connection request;
acquiring, with the processor, payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest;
identifying, with the processor, a profile type of the payload data;
dividing the payload data into a plurality of portions based at least on a number of unmanned aerial vehicles associated with the communication network when the profile type of the payload data has a first profile type; and
transmitting, with the processor, a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has the first profile type.
8. An apparatus to establish a communication network for unmanned aerial vehicles, the apparatus comprising:
a discovery engine configured to:
establish a discoverable network node in a first unmanned aerial vehicle in response to a deployment in a geographic region of interest; and
join a second unmanned aerial vehicle to the communication network in response to a connection request;
a payload equipment interface configured to acquire payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest;
a payload data type identifier configured to identify a profile type of the payload data; and
a data transfer engine configured to:
divide the payload data into a plurality of portions based at least on a number of unmanned aerial vehicles associated with the communication network and the profile type; and
transmit a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has a first profile type.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
9. The apparatus of
10. The apparatus of
11. The apparatus of
12. The apparatus of
13. The apparatus of
14. The apparatus of
16. The tangible computer readable storage medium of
17. The tangible computer readable storage medium of
18. The tangible computer readable storage medium of
19. The tangible computer readable storage medium of
20. The tangible computer readable storage medium of
21. The tangible computer readable storage medium of
|
This disclosure relates generally to establishing and maintaining unmanned aerial vehicle (UAV) communications, and, more particularly, to network UAVs.
In recent years, use of unmanned aerial vehicles (UAVs) have been applied for search-and-rescue missions, scientific research, mapping projects, and more. The UAVs may include payload equipment for the purpose of acquiring data related to deployment objectives, in which respective payload data is to be retrieved and/or otherwise received by mission control center(s) (e.g., a ground command center). The payload data may contain images (e.g., high resolution photos, multi-spectral images, thermal images, etc.), video (e.g., live-action, infrared video, etc.), and/or sensor data (e.g., barometric pressure, temperature, magnetic/electric field data, radar, etc.). In some examples, data retrieved and/or otherwise received by the UAVs may allow strategic planning before sending appropriate personnel and/or equipment to one or more points of interest.
Example methods disclosed herein include establishing a communication network for unmanned aerial vehicles by establishing a discoverable network node in a first unmanned aerial vehicle in response to deployment in a geographic region of interest, joining a second unmanned aerial vehicle to the communication network in response to a connection request, acquiring payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest, identifying a profile type of the payload data, and transmitting a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has a first profile type.
Example apparatus to establish a communication network for unmanned aerial vehicles disclosed herein include a discovery engine to establish a discoverable network node in a first unmanned aerial vehicle in response to a deployment in a geographic region of interest, and join a second unmanned aerial vehicle to the communication network in response to a connection request. Example apparatus also include a payload equipment interface to acquire payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest, a payload data type identifier to identify a profile type of the payload data, and a data transfer engine to transmit a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has a first profile type.
An example tangible article of manufacture comprising instructions is disclosed herein. The example instructions, when executed, perform operations including establishing a discoverable network node in a first unmanned aerial vehicle in response to deployment in a geographic region of interest, joining a second unmanned aerial vehicle to the communication network in response to a connection request, acquiring payload data with a sensor of the first unmanned aerial vehicle from the geographic region of interest, identifying a profile type of the payload data, and transmitting a first portion of the payload data to the second unmanned aerial vehicle when the profile type of the payload data has a first profile type.
While payload data generated and/or otherwise acquired by payload equipment on-board unmanned aerial vehicles (UAVs) (sometimes referred to as “drones”) may be useful to accomplish certain mission objectives, such payload data is vulnerable to several threats. Threats may include communication reliability due to distance limitations between the UAVs and a command center, or due to environmental interference. Threats may also be associated with data sensitivity and/or privacy concerns, such as UAV data acquisition missions related to law enforcement missions, or military missions involving secretive information. In some examples, data acquired by UAVs is the target of malicious activity that attempts to intercept and/or otherwise destroy the acquired data. Additional challenges associated with using UAVs to acquire data relates to limited storage capabilities of the UAVs, which can reduce mission flight duration when data storage capacity becomes fully consumed. Further, in the event a UAV crashes in a remote area, data already acquired by the fallen UAV may be susceptible to discovery and/or disclosure to unwanted parties that obtain the fallen UAV.
Traditional ways of collecting acquired data from UAVs include physically retrieving the UAV after the mission objectives are complete and physically downloading such acquired data from on-board storage (e.g., hard disks, solid-state drives, flash memory, etc.). However, in the event the UAV experiences a flight error, collision or crash, then the acquired data may be lost and/or retrieved by (malicious) third parties. In other traditional examples, the UAV transmits the acquired data as a file via one or more wireless connections (e.g., cell-based protocols (e.g., LTE), 802.x protocols, radios, etc.). However, in the event of intermittent, noisy or poor radio-based connections between the UAV and the control center, data corruption and/or data loss may occur.
Example methods, apparatus, systems and articles of manufacture disclosed herein retrieve UAV payload information in a manner that improves efficiency and security.
The example command center 104 is communicatively connected to the example first UAV 106 and the example second UAV 108 when initially deployed. However, as one or more of the UAVs travels away from the example command center 104, direct (e.g., radio-based) communication techniques may have inherent limitations that prevent communication with the one or more UAVs. To allow the example command center 104 a greater ability to maintain communication with one or more deployed UAVs (e.g., the example first UAV 106, the example second UAV 108, etc.), the command center 104 is communicatively connected to one or more cell-based communication networks and/or satellite-based communication networks. In the illustrated example of
In some examples, a UAV that has travelled away from the example command center 104 may not be able to maintain communication capabilities with the command center 104. Even when the one or more UAVs include multiple different communication capabilities (e.g., cell-based, 802.11x, satellite, etc.), several reasons may cause the lack of communication capabilities therebetween. Example reasons for a lack of communication capabilities include, but are not limited to communication technology distance limitations, insufficient cell coverage, electrical noise interference, weather conditions, malicious jamming activity, etc. In the illustrated example of
Example methods, apparatus, systems and articles of manufacture disclosed herein improve the security and reliability of UAV communication by, in part, establishing a dynamic communication cloud. In some examples, deployed UAVs invoke a peer-UAV discovery command to identify one or more additional UAVs that have also been deployed for a particular mission (e.g., a search-and-rescue). In the event a peer-UAV is identified, both UAVs establish an ad-hoc communication network therebetween. As one or more additional peer-UAVs are identified, they too are added to the ad-hoc communication network. As a result, in the event one or more of the UAVs cannot directly communicate with the example command center 104, then payload data, control commands and/or telemetry information can be relayed to one or more of the peer UAVs within the ad-hoc communication network. Data that has been relayed from one UAV to a peer-UAV may be further transmitted to the command center 104, particularly in instances where the peer-UAV is relatively closer to the command center 104. However, in the event a first peer-UAV is still unable to transmit data to the example command center 104, then additional peer-UAVs may receive and/or otherwise retrieve (sometimes referred herein as “UAV hops”) payload data for continued attempts to deliver the payload data to the command center 104. Any number of UAV hops may be employed in an effort to ultimately provide the payload data to the example command center 104.
In some examples, a UAV may experience flight errors and/or communication errors indicative of risk to acquired payload data. Flight errors may include mechanical and/or electro-mechanical irregularities detected by on-board flight controllers. Flight errors may also include collision instances with objects and/or weather conditions that prohibit execution of a mission. Communication errors may include communication signal strength degradation and/or intermittent communication reliability. In the event flight errors and/or communication errors are detected by the UAV, then payload data preservation actions may be invoked by the UAV to offload collected payload data to a safe target, such as one or more peer-UAVs. The payload data preservation actions may seek one or more peer-UAVs in an effort to begin payload data transmission before the flight and/or communication error advances further.
In the event a flight error results in a crash of the UAV, the example payload data preservation actions may continue to seek one or more peer-UAVs for data offload. However, in the event efforts to transmit the payload data to the one or more peer-UAVs fails, then the payload data preservation actions may include data encryption actions or payload data deletion actions, both of which reduce chances of unwanted third parties from obtaining the collected payload data from the disabled UAV. In still other examples, after the disabled UAV completes payload data transfer actions to the one or more peer-UAVs, the disabled UAV may delete the on-board payload data to prevent unwanted disclosure of that data.
In some examples, one or more deployed UAVs detects the presence of a foreign UAV 150 in the vicinity of the geographic ROI 102. In such instances, the payload data preservation actions may include switching a communication protocol used by the ad-hoc network of UAVs to reduce the possibility of the foreign UAV 150 from obtaining payload data. For example, the ad-hoc network of UAVs may initially utilize an 802.11x protocol to transfer data and/or commands therebetween. In view of particular security vulnerabilities associated with the 802.11x protocol(s), the example payload data preservation actions may switch to a relatively more secure communication protocol, such as a cell-based Long-Term Evolution (LTE) protocol. Additionally, in response to detecting a threat, such as a foreign UAV 150, the example payload data preservation actions may instruct one or more UAVs to abort the mission and/or return to the example command center 104 or return to another destination to avoid further exposure to the threat.
In the illustrated example of
In some examples, payload data is stored in differing manners depending on a data type, a data resolution and/or operational conditions. For example, video data may be collected while the UAV is en-route to the geographic ROI at a first resolution and, once the UAV arrives at the target destination, video data may be collected at a relatively higher second resolution. While the relatively lower resolution data may have a particular value to a search-and-rescue team to evaluate the ease or difficulty in reaching the geographic ROI, the relatively higher resolution data acquired at the ROI is beneficial for rescue personnel when determining a severity of their rescue effort. In an effort to transmit acquired data without inundating communication capabilities of any one UAV, examples disclosed herein divide the payload data into two or more portions for transmission to peer-UAVs. The example payload data type identifier 212 determines a particular data type (e.g., high resolution, low resolution, a codec type, top secret, etc.) and, if the data type matches a data transfer profile rule, the example UAV data transfer engine 216 determines data portions for multi-UAV distribution.
Upon completion of transferring the first portion of data 308 to the second UAV 108, the second UAV transmits the first portion of data 308 to the command center 104, such as by way of a cell-based network having a greater communication range than the inter-UAV ad-hoc network. Additionally, upon completion of transferring the first portion of data 308 to the second UAV 108, the first UAV transmits the remaining portion 310 to the command center 104, such as by way of the cell-based network. After the first portion of data 308 is transferred to the second UAV 108, the first portion of data 308 may be deleted from UAV storage, thereby allocating additional storage space for further mission data acquisition. Additionally, after the second portion of data 310 is transferred to the command center 104, the second portion of data 310 may be deleted from UAV storage, thereby allocating additional storage space for further mission data acquisition. While the illustrated example of
In some examples, peer-UAV payload data transfers occur by way of an 802.11x protocol that has bandwidth and power consumption advantages over alternative communication protocols, such as LTE. As such, the example peer-UAV transfers of portions of payload data allows each recipient UAV to further transfer their respective portions to the command center 104 faster than would otherwise occur if only a single UAV was responsible for the complete data payload. Further, because each respective peer-UAV is only transmitting their portion of the payload data using the LTE protocol, the respective power consumed by the LTE radio(s) is reduced due to the smaller portion of payload data it is responsible for.
After a successful transfer of a portion of payload data from the first UAV 106 to the second UAV 108, the example payload data storage interface 108 deletes the transferred portion of payload data from on-board storage (e.g., the example payload data storage 130). As a result, the first UAV 106 has relinquished an amount of storage space that can otherwise be consumed by additional mission data acquisition activities. Additionally, in the event the first UAV 106 is lost or stolen, the deleted portion of payload data is no longer a security risk. The remaining portion(s) of payload data that were not transferred to a peer-UAV are either maintained in on-board memory or, as described above, transferred back to the command center 104, if possible. For example, if the first UAV 106 has communication capabilities with the command center 104 (e.g., radio-based communication capabilities that are in-range, LTE communication capabilities that are in-range, etc.), then the remaining portion(s) of payload data not previously transferred to the peer-UAVs is transferred back to the command center 104.
In some examples, attempts to transfer payload data from the UAV to one or more peer-UAVs is not successful. The example UAV data transfer engine 216 determines whether a threshold transmission duration has been satisfied and, if not, further transfer attempts are attempted. However, when the example UAV data transfer engine 216 determines that the threshold transmission duration has been exceeded, then the example payload data storage interface 208 determines whether to delete the payload data in the interest of security. If the payload data is not to be deleted, such as in circumstances where the payload data is not deemed particularly sensitive or secret, then the payload data is maintained in the example payload data storage 130. The example flight system interface 204 then issues a command to return the UAV to the command center 104, or to perform a safe landing. On the other hand, in the event the example payload data storage interface 208 determines that the payload data is to be deleted, then it deletes the payload data from the example payload data storage 130 to prevent disclosure to third parties in the event the UAV does not successfully return to the command center 104.
In some examples, the example flight system interface 204 determines whether an indication of UAV failure has occurred. For example, if the example flight system interface 204 detects a component failure and/or intermittent functionality, then a concern for safe retrieval of the UAV may exist. In response to detecting the failure indication, the example payload data storage interface 208 determines whether the payload data is to be deleted in the interest of data security. If so, then the example payload data storage interface 208 deletes the payload data. As such, if the detected failure ultimately results in a crash, then third party theft of the UAV will not result in disclosure of the payload data.
During mission operation, a deployment profile manages decisions regarding: whether to enable peer-UAV payload data transfers, whether to transfer remaining payload data to the command center or retain in on-board memory, whether to change a communication protocol, and/or whether to delete payload data in view of one or more triggers. In the illustrated example of
While an example manner of implementing the payload manager 128 of
Flowcharts representative of example machine readable instructions for implementing the payload manager 128 of
As mentioned above, the example processes of
The program 500 of
In the illustrated example of
Returning to
In the event one or more peer-UAV transfers is to occur (block 514), then the example UAV data transfer engine 216 manages the one or more peer-UAV transfers (block 518).
In the event that the UAV data transfer engine 216 determines that the peer-UAV transfer was not successful (block 524), then the example UAV data transfer engine 216 determines whether a time threshold has expired (block 526), such as an amount of time to allow the data to be transferred and/or an amount of time to permit one or more data transmission reattempts. If the time threshold has not expired (block 526), the example flight system interface 204 also determines whether a UAV failure indication has been retrieved and/or otherwise received (block 528). If no UAV failure indication has been determined (block 528), then control returns to block 526 to determine whether the timeout (e.g., satisfaction of a time threshold) has occurred.
If either a timeout has occurred (block 526) or an indication of UAV failure has been determined (block 528), then the example payload data storage interface 208 determines whether to delete the payload data (block 530). As described above, UAVs may operate in hostile territories in which the payload data collected thereon may be deemed sensitive, secret and/or otherwise not appropriate for disclosure to one or more third parties. As described above in connection with the example deployment profile 400 of
Returning to block 524, in the event the example peer-UAV transfer was successful, then the example payload data storage interface 208 performs post-UAV transfer handling (block 536).
While the illustrated example of
The example communication equipment interface 202 establishes a discoverable network node for candidate peer-UAVs that may be in communication range (block 606). If the UAV has not yet arrived at the geographic ROI 102, as determined by the example flight system interface 204 (block 608), the example UAV discovery engine 210 determines whether one or more peer-UAVs has made a request to join a cloud network (block 610). If so, then the example UAV discovery engine 210 establishes communication with the requesting UAV to participate in the cloud network of two or more UAVs (block 612). When the example flight system interface 204 determines that the UAV (e.g., the first UAV deployed and closest to the geographic ROI) has arrived at the example geographic ROI 102 (block 608), then the example payload equipment interface 206 activates one or more sensors or other data acquisition equipment carried by the UAV (block 614) and the example payload data storage interface 208 begins acquisition of payload data (block 616). However, in some examples, the payload equipment interface 206 activates the data acquisition equipment carried by the UAV as soon as it is deployed. For example, a video camera carried by the UAV may be activated as soon as the UAV is deployed to capture video information en-route to the example geographic ROI 102. In some examples, the video camera acquires video information at one resolution (e.g., a relatively low resolution (640×480)) en-route to the geographic ROI 102, and then acquires video information at a second resolution (e.g., a relatively higher resolution (1920×1080) upon arriving at the geographic ROI 102. Additional detail associated with payload data management (block 618) is shown below in connection with
In the illustrated example of
In the illustrated example of
In the event one or more deployment parameters indicate that the payload data is to be sent to a peer-UAV (block 632), then the example UAV data transfer engine 216 determines whether the payload data should be partitioned (block 636). In some examples, the deployment profile 400 includes default settings/instructions regarding peer-UAV payload partitioning in an effort to reduce a bandwidth and/or power requirements of the UAV. For example, while the UAV may be equipped with an LTE radio, such communication technologies consume relatively greater amounts of limited battery power of the UAV during transmission. However, by off-loading one or more portions of the payload data to one or more peer-UAVs, the amount of power consumed by the UAV when sending the payload data to the command center is reduced because a relatively smaller amount of payload data is sent using the LTE radio(s). In other words, a communication power budget for the networked UAVs is distributed more efficiently among the participating UAVs in the network. The example UAV data transfer engine 216 determines how the payload data is to be divided (block 638), and the partitions are transmitted to one or more peer-UAVs (block 640). However, if the example UAV data transfer engine 216 determines that the payload data is not to be partitioned (block 636), then the example communication equipment interface 202 identifies a desired communication protocol with which to transmit the payload data (e.g., cell-based LTE, satellite, etc.) (block 642). The example UAV data transfer engine 216 then sends the payload data to the peer UAV and performs any desired cleanup thereafter (e.g., deleting payload data from memory in response to an indication of transfer success) (block 644).
Returning to the illustrated example of
The example UAV discovery engine 210 determines whether one or more foreign UAVs are detected (block 626). If so, then the example communication system interface 202 determines whether a communication protocol change is to occur (block 648). In some examples, the communication system interface 202 refers to the deployment profile for instructions and/or actions to be taken in response to the detection of a threat, such as the detection of one or more foreign UAVs that may be proximate to the geographic ROI 102. If the communication protocol is to be changed in response to detecting a threat (block 648), then the example communication system interface 202 halts a current communication technology of the UAV and initiates one or more alternate communication protocols in an effort to enhance security of the payload data (block 650).
In the event the example flight system interface 204 detects an indication of a UAV failure (block 628), such as a motor failure indication, an electromechanical failure indication, particularly harsh weather conditions, etc., then failure handling is initiated (block 652), as described in further detail in
In some examples, instead of or in addition to returning to the command center 104, the example UAV discovery engine 210 determines whether a peer-UAV data transfer is still possible, despite the UAV failure indication (block 658). If such communication is still possible, then the UAV data transfer engine 216 transmits the payload data to one or more peer-UAVs within communication range of the crippled UAV (block 660). In still other examples, if the peer-UAV communication transfer is not possible (block 658) or after a successful transmission of the payload data to one or more peer-UAVs (block 660), the example payload data storage interface 208 determines whether to delete the payload data from on-board storage (block 662). As described above, in the event the UAV ultimately lands or crashes, any data stored thereon may be at risk of discovery by third parties. To reduce such a risk, the example payload data storage interface 208 deletes any payload data stored on the UAV (block 664). Alternatively, the example encryption engine 214 determines whether to encrypt the payload data (block 666), which may be an instruction from the example deployment profile 400. If so, then the example encryption engine 214 encrypts the payload data (block 668) to reduce the possibility that a third party obtains the payload data in case the UAV crashes or lands safely.
The processor platform 700 of the illustrated example includes a processor 712. The processor 712 of the illustrated example is hardware. For example, the processor 712 can be implemented by one or more integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer. In the illustrated example of
The processor 712 of the illustrated example includes a local memory 713 (e.g., a cache). The processor 712 of the illustrated example is in communication with a main memory including a volatile memory 714 and a non-volatile memory 716 via a bus 718. The volatile memory 714 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory 716 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 714, 716 is controlled by a memory controller.
The processor platform 700 of the illustrated example also includes an interface circuit 720. The interface circuit 720 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
In the illustrated example, one or more input devices 722 are connected to the interface circuit 720. The input device(s) 722 permit(s) a user to enter data and commands into the processor 712. The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 724 are also connected to the interface circuit 720 of the illustrated example. The output devices 724 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen and/or speakers). The interface circuit 720 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip or a graphics driver processor.
The interface circuit 720 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 726 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
The processor platform 700 of the illustrated example also includes one or more mass storage devices 728 for storing software and/or data. Examples of such mass storage devices 728 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives.
The coded instructions 732 of
From the foregoing, it will be appreciated that the above disclosed methods, apparatus and articles of manufacture facilitate improved networking of unmanned aerial vehicles that allows preservation and security of payload data under conditions that would otherwise jeopardize such payload data. Additionally, examples disclosed herein improve energy conservation (e.g., battery storage resources) of two or more networked UAVs by preventing any one of the networked UAVs from being the sole UAV designated for transmission of acquired payload data to one or more destinations. As disclosed herein, transmission of acquired payload data via a cell-based technology (e.g., LTE) may afford a desirable communication range, but at an expense of an energy drain while performing such transmissions. As such, examples disclosed herein distribute payload data transmission responsibilities to one or more other UAVs by first offloading one or more portions of the payload data using a more energy efficient communication technology (e.g., 802.xx) to proximate UAVs. Further, security of the payload data is improved by examples disclosed herein, such that perceived or actual threats by foreign UAVs in a vicinity of the geographic ROI may be addressed by dynamic communication protocol technology switching.
Although certain example methods, apparatus and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.
Patent | Priority | Assignee | Title |
10757596, | Jun 29 2018 | Intel Corporation | Methods and apparatus to collect data from user equipment outside a network |
Patent | Priority | Assignee | Title |
9022324, | May 05 2014 | ABHYANKER, RAJ | Coordination of aerial vehicles through a central server |
9043052, | May 27 2008 | System and method for multiple vehicles moving a common payload | |
9051043, | Dec 28 2012 | WING Aviation LLC | Providing emergency medical services using unmanned aerial vehicles |
9056676, | May 30 2014 | SZ DJI TECHNOLOGY CO , LTD | Systems and methods for UAV docking |
9075415, | Mar 11 2013 | AIRPHRAME, INC | Unmanned aerial vehicle and methods for controlling same |
9524648, | Nov 17 2014 | Amazon Technologies, Inc | Countermeasures for threats to an uncrewed autonomous vehicle |
20040193878, | |||
20140172194, | |||
20140316616, | |||
20150236778, | |||
20150304869, | |||
20150327136, | |||
20150336668, | |||
20150351084, | |||
20160003954, | |||
20160137311, | |||
20160155339, | |||
WO2015139733, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 16 2016 | AT&T Intellectual Property I, L.P. | (assignment on the face of the patent) | / | |||
Feb 16 2016 | DOWLATKHAH, SANGAR | AT&T INTELLECTUAL PROPERTY I , L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037776 | /0954 |
Date | Maintenance Fee Events |
Mar 11 2021 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Oct 10 2020 | 4 years fee payment window open |
Apr 10 2021 | 6 months grace period start (w surcharge) |
Oct 10 2021 | patent expiry (for year 4) |
Oct 10 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
Oct 10 2024 | 8 years fee payment window open |
Apr 10 2025 | 6 months grace period start (w surcharge) |
Oct 10 2025 | patent expiry (for year 8) |
Oct 10 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
Oct 10 2028 | 12 years fee payment window open |
Apr 10 2029 | 6 months grace period start (w surcharge) |
Oct 10 2029 | patent expiry (for year 12) |
Oct 10 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |